Cloud Security

Managing Kubernetes Secrets with HashiCorp Vault vs. Azure Key Vault

Keeping secrets secure on Kubernetes is crucial for every organization. However, it’s easier said than done.

Public Cloud Kubernetes v Other Distros – A Security View

Last week I published a blog, “How to spot gaps in your Public Cloud Kubernetes Security Posture” with the aim of providing a very high-level view of where security matters in public cloud Kubernetes. Originally I intended to provide information for people new to Kubernetes and a few people have asked for some context to...

How to Spot Gaps in Your Public Cloud Kubernetes Security Posture

Breaking down the core areas that you should be aware of when considering security around public cloud Kubernetes The Control Plane API Server The API server provides the entry point specifically for the management of a Kubernetes cluster. The API server endpoint is secured through public cloud IAM and also Kubernetes RBAC – however, it...

Beware: The Kubernetes Security Nightmare

Security breaches are what nightmares are made of. You probably have your own ‘nightmares’ that come to mind. Tesla was hacked because their Kubernetes administrative console was not password protected. In another incident, Capital One left their AWS firewall definitions too lax and 30GB of credit application data (affecting 106 million customers) was exposed. Aside...

5 Things That Will Improve Your Kubernetes Security Posture

Kubernetes offers a variety of security controls, but using a default configuration exposes a wide attack surface and leaves you open and vulnerable to potential risks. In 2020, nearly 7 out of 10 companies reported a detected misconfiguration in their Kubernetes environment, making it by far the most common type of vulnerability. 2020 State of...

How to Take ‘Shared Responsibility’ of Cloud Security

When you first embark on cloud, it often begins with a credit card transaction, a shadow IT department or as a proof-of-value with a given project before a more strategic commercial agreement. Getting clarity on the details of what the cloud provider is responsible for and what you, as a customer, are responsible for can...

Automated Cloud Security Is Critical for the Future

In just the first half of 2020, data breaches exposed 36 billion records. And, as the web continues on the trend of explosive growth, there are constantly new security challenges on the horizon. With vulnerabilities around every corner, effective and comprehensive security policies are more important than ever. The cycle of manually creating and maintaining...

Cloud Data Breaches in Retail: How to Protect Yourself

The rush to cloud for the retail sector has increased significantly in 2020/2021 due to COVID, and along with it an increasing number of cyberattack attempts happening against them. Being aggregators of large amounts of personally identifiable information (PII) and credit card data, online retailers are an easy target for cyber criminals. Data breaches exposed...

Working Through Least Privilege with Microsoft Azure

In March 2021 a few of Appvia’s senior engineers were invited to take part in Microsoft’s three-day One Commercial Partner (OCP) Hackathon, working directly alongside Microsoft engineers to ideate and work through a potential approach to implementing least privilege on Microsoft Azure. The Principle of Least Privilege (sometimes referred to as just ‘Least Privilege’ or...